Skip to main content

Home/ Groups/ Digiteen
James D

ad4dcss - home - 0 views

  •  
    This website has a lot of information about digital citizenship.
  •  
    Some good information here.
Ivy F.

digiteen2008 - Digital Access - 0 views

  • The reason this page is here is to tell people about digital access, what problems there are and how we can solve them. Digital Access is insuring that everyone no matter who they has access to the internet.
    • Ivy F.
       
      This will help!
  • Access is a very important thing in life. The ten most important terms that have to do with Access are: connect, internet, access, obtain, retrieve, regain and gate way which all mean that there is or you can access something although in particular, the internet.
  • Identity is a topic that people may not think about as access. Although it is. Identity can be shown on the computer or on the internet. When you have access to the internet your identity can be shown through various ways for example, Facebook and MySpace through profiles, pictures and the network. It is a positive thing because now you can show your identity to other people around the world.
  • ...27 more annotations...
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Adults
  • Identity is a topic that people may not think about as access
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Adults
  • 72% of U.S. adults now have Broadband access. Those who don't get it go to work, public libraries, schools, and as well as on their cell phones.
  • In Australia 74.3 people access the internet but only 22.8 percent of people have broadband access.
  • you have access to the internet your identity can be shown through various ways for example, Facebook and MySpace through profiles, pictures and the network
  • Elementary Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Middle/ High School Aged Students
  • Infrastructure can be very useful although on the other hand can be bad.
  • Education is very important as well
  • Censorship is another problem although it can also be helpful
  • Identity is a topic that people may not think about as access
  • positive thing because now you can show your identity to other people around the world
    • Ivy F.
       
      this will help many people, i should hope!
  • Digital Divide is probably the most important and simplest topic
  • They can get internet on computers by joining a local wi-fi like at a coffee shop, at school, or at a business. Digital Access is how everyday people access their computers and the Internet.
  • 72% of U.S. adults now have Broadband access. Those who don't get it go to work, public libraries, schools, and as well as on their cell phones.
  • mostly go to websites that have games for kids to play. Millsberry, Build a bear, Webkinz, and Club penguin are all places that children could create their own animated avatar type stuff
  • Censorship is when you are not allowed to do something and if you do you will be in trouble by the government. For example, in China they have censorship and they are not allowed to look certain things up on the internet
  • Digital Divide is basically having a line and putting the people that don’t have access to the internet on one side and the ones that do on the other side.
    • hannah h
       
      The digital divide here in south Georgia USA would be like those people who have high speed internet vs. those who have dial up or don't have INternet that are in the country.
  • one of the main problems for adults and kids with accessing the Internet around the world is, simply, their location. People who live in the city would have no problem finding a computer to go on the Internet and do as they want,
  •  
    this is the Access page. from last year.
  •  
    Access page from 2008
Erin B

digiteen2008 - Digital Commerce - 0 views

  •  
    This is last year's project page. We might be able to get some ideas from this for our project this year if you are in Group 9A. It has a couple of videos and other information that might be useful.
Nolan C

Netiquette - Wikipedia, the free encyclopedia - 0 views

shared by Nolan C on 02 Oct 09 - Cached
  • Netiquette (a compound formed from "net etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855.[1] However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Netiquette guidelines posted by IBM for employees utilizing Second Life in an official capacity, however, focus on basic professionalism, maintaining a tenable work environment, and protecting IBM's intellectual property.[2] Similarly, some Usenet guidelines call for use of unabbreviated English[3][4] while users of online chat protocols like IRC and instant messaging protocols like SMS often encourage just the opposite, bolstering use of SMS language.
  • Common rules for e-mail[7] and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in all caps, which is considered to be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally intuitively understood by publishers of web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. On more private protocols, however, such as email and SMS, some users take the privacy of their posts for granted. One-on-one communications, such as private messages on chat forums and direct SMSes, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.[8]
  •  
    Netiquette project
  • ...2 more comments...
  •  
    the definition of netiquette
  •  
    Wikipedia definition of Netiquette
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
alex c

Rule 5: Make yourself look good online - 0 views

shared by alex c on 02 Oct 09 - Cached
  • Take advantage of your anonymity
alex c

Netiquette Email 101 @kassj.com - 0 views

  • 1. ALL CAPS means shouting 2. Use underscores or asterisks for emphasizing words 3. Watch your tone -- it's written, not verbal communication 4. Check your spelling 5. Quote back only what is relevant 6. Use an automatic signature, especially if you are a business 7. Where are you located if requesting goods or services? 8. Don't send unsolicited file attachments 9. Use a descriptive Subject line 10. Only forward jokes and chainletters if you are SURE the recipient wants them (and hasn't already gotten a copy or three from someone else) 11. Don't send "Check This Out" Unsolicited URLs 12. Don't expose your email routing list to spammers 13. If you are on AOL, do not use the "Forward" command 14. Don't believe every cybermyth, urban legend, hoax or virus "alert" sent to you
  •  
    These are a few rules on using E-mail etiquette.
Erin B

Electronic commerce - Wikipedia, the free encyclopedia - 0 views

  • Electronic Commerce, commonly known as (electronic marketing) e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.
  • Electronic commerce that is conducted between businesses is referred to as business-to-business or B2B.
  • Electronic commerce that is conducted between businesses and consumers, on the other hand, is referred to as business-to-consumer or B2C. This is the type of electronic commerce conducted by companies such as Amazon.com.
  •  
    a definition of e-commerce
hannah h

Collaboration - Wikipedia, the free encyclopedia - 0 views

  • Collaboration is a recursive process where two or more people or organizations work together in an intersection of common goals — for example, an intellectual endeavor[1] [2] that is creative in nature[3]—by sharing knowledge, learning and building consensus. Most collaboration requires leadership, although the form of leadership can be social within a decentralized and egalitarian group.[4] In particular, teams that work collaboratively can obtain greater resources, recognition and reward when facing competition for finite resources.[5]Collaboration is also present in opposing goals exhibiting the notion of adversarial collaboration, though this is not a common case for using the term.
  •  
    this is a bookmark for my project on access and collaboration.
Ivy F.

Censorship - Wikipedia, the free encyclopedia - 0 views

  • Censorship is the suppression of speech or deletion of communicative material which may be considered objectionable, harmful, sensitive, or inconvenient to the government or media organizations as determined by a censor.
  •  
    this on CENSORSHIP
brooke s

digiteen2008 - Digital Law - 0 views

  • This is the electronic responsibility for actions which says if something is ethical or unethical. The responsibility of the digital law deals with the ethics of technology as a whole. Digital Law deals with four main topics: copyright, privacy, ethical issues, and piracy. Unethical use of computers can form into theft or crime like piracy. People that are ethical in the use of their computers may actually be the ones being hurt by those who are not following these protective laws. A student should not be allowed to mess with other peoples work or identity with rules being applied. We have the digital Law to basically protect us; since most people don't follow it, the internet is becoming a very dangerous place.
    • brooke s
       
      this paragraph explains the four main topics dealing with the "Digital Law"
  • . There are so many new illegal ways to get what you want and not get caught that it is very hard to find the causes of viruses and other crimes. Some problems with Elementary students are that they can get on sites too mature for their age. The information on these sites may be inappropriate for their age group. Another problem may be that older people may harass them. There are also some problems with Middle/High school aged students. They may get on sites such as MySpace or Facebook and lie about their age, name, or any other aspects of their lives. This is not a very smart act considering that later they may be abused. They may use bad language on the internet or chat rooms. Predators can trick some teens that are unaware of such dangers into meeting up with them. Parents/guardians are unaware of what teens are looking at and/or doing and therefore cannot stop them from seeing and/or doing inappropriate things.
    • brooke s
       
      This paragraph explains the dangers on the internet.
  • Some teens download illegal music such as Limewire or Bearshare.This affects not only the artist, but record producing companies.
    • brooke s
       
      using internet wrongly could hurt other people financially, such as music artists and producers.
  • ...3 more annotations...
  • There are also some problems with adults. Using bad language, harassing and trapping youth, and the buying and selling of illegal merchandise are just some of the problems the adult generation faces today. Many adults are very sneaky and can use tricks to socialize with young adolescents. Some adults use Facebook, Myspace, or chatrooms to trick younger people into meeting up with them. These are just some of the main problems our generation of all different ages faces in this day and time.
    • brooke s
       
      More dangers of the internet.
  • Breaking the law: On the internet you will come upon websites that will be breaking the law and you can report this to "NETALERT" www.neralert.vic.a, they will contact the authorities and put a stop to the website. Another problem is copyright. There is an easy solution to this problem though, and this solution is creative commonscreative commons is a site that lets you easily make your own copyright laws for your work. There are rules like no one can make money off of your work, no one can change the appearence of your work, and many more. By making it a law that people have to use creative commons to put anything on the internet, you can reduce the amount of copyright laws broken. Making adults aware of the consequences of their actions should help the problem dramatically. Most adults break digital laws thinking, " Oh yeah, sure, I'm not going to get into any trouble." when in fact they are on the verge to getting very serious legal punishment.
    • brooke s
       
      more on breaking the internet law
  • There is a very interesting controversy brewing in Orange County, Florida. A 13-year-old girl Alisha Dean has a MySpace page that portrays herself as a 19-year-old divorced woman. She has been accused about lying to two men — Morris Williams, 22, and Darwin Mills, 24, about her age in two separate incidents. Both have been convicted and sent to jail for statutory rape. Digital Law for Middle School students not only has to deal with privacy but copyright and piracy.
    • brooke s
       
      controversy with young people lying about their age
mitch g

Communication - Wikipedia, the free encyclopedia - 0 views

  • Communication is a process of transferring information from one entity to anothe
  • sign-mediated interactions
  • between at least two agents which share a repertoire of signs and semiotic rules.
  • ...3 more annotations...
  • defined as "the imparting or
  • interchange of thoughts, opinions, or information by speech, writing, or signs".
  • two-way process in
  •  
    communication- the process of transferring information from one entity to another
Ivy F.

Scrutiny - Wikipedia, the free encyclopedia - 0 views

  •  
    this is talking about the meaning of scrutiny
  •  
    digiteen 09
mitch g

Technology reshapes the ways we communicate. - Free Online Library - 0 views

  • We will continue to see, for example, incredible breakthroughs in miniaturization min·i·a·tur·ize  tr.v. min·i·a·tur·ized, min·i·a·tur·iz·ing, min·i·a·tur·iz·esTo plan or make on a greatly reduced scale.min ..... Click the link for more information. and chip memory. Chip memory is evolving from about 20 million transistors on a 16-megabit
  • New telecommunications technologies are revolutionizing the ways we share information
  • Other forms of memory also are constantly expanding. A 5.5-inch CD-ROM CD-ROM: see compact disc. CD-ROM in full compact disc read-only memoryType of computer storage medium that is read optically (e.g., by a laser). ..... Click the link for more information. can already store up to 65,000 pages of documents - about 30 yards of books.
  • ...7 more annotations...
  • six of the key technological components of
  • this revolution are digital systems, fibre optics fibre opticsThin transparent fibres of glass or plastic that transmit light through their length by internal reflections, used for transmitting data, voice, and images. ..... Click the link for more information., new wireless technologies, satellite
  • technologies, new levels of network intelligence and multi-media networking.
  • The ongoing push toward all-digital networks is making it possible to send any type of
  • information - sound, image, data and full-motion video Video transmission that changes the image 30 frames per second (30 fps). Motion pictures are run at 24 fps, which is the minimum frequency required to eliminate the perception of moving frames and make the images appear visually fluid to the eye. ..... Click the link for more information. -
  • Video conferencing See videoconferencing. (communications) video conferencing - A discussion between two or more groups of people who are in different places but can see and hear each other using electronic communications. ..... Click the link for more information., one of the burgeoning areas in the industry, is expected to grow by more than 25 per cent annually in Canada in the next four years.
  • New wireless technologies are also providing new levels of reachability and mobility when and wherever the communication of information is desired or neede
d l

Computer Health Hazards: Eyestrain, Carpal Tunnel Syndrome, and Neck/Back Pain - 0 views

  •  
    This website tells you of some of the problems from the computer and how to help with them.
Brody C

Cyber-bullying - Wikipedia, the free encyclopedia - 0 views

  • The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] StopCyberbullying.org, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child, tween or teen using text messaging, email, instant messaging or any other type of digital technology." Other researchers use similar language to describe the phenomenon.[3][4] Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation. Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target. Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators. [edit] Cyber-bullying vs. cyber-stalking The practice of cyberbullying is not limited to children and, while the behavior is identified by the same definition in adults, the distinction in age groups is referred to as cyberstalking or cyberharassment when perpetrated by adults toward adults. Common tactics used by cyberstalkers are to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. A pattern of repeated such actions against a target by and between adults constitutes cyberstalking.
  •  
    cyber-bullying and stalking
Ivy F.

The Great Beyond: Data integrity in the digital age - 0 views

  • With the emergence of web-based lab notebooks, digital image “enhancement”, and the quick and easy (and possibly dirty) generation and dissemination of colossal amounts of data, it’s becoming increasingly clear that technology provides new challenges to maintaining scientific integrity
Ashley M

Plagiarism.org : Learning Center : Plagiarism Definitions, Tips on avoiding Plagiarism,... - 0 views

  • According to the Merriam-Webster Online Dictionary, to "plagiarize" means to steal and pass off (the ideas or words of another) as one's own to use (another's production) without crediting the source to commit literary theft to present as new and original an idea or product derived from an existing source.
    • Ashley M
       
      This information helps us learn what plagiarism is and how it can be a problem in schools.
Ivy F.

Shaping Youth » Grown Up Digital: Don Tapscott's Latest On 'Generation Net' - 0 views

  • hat digital premise opens up the debate for the 21st century tug-o-war of perception between what Wikinomics author Don Tapscott of Grown Up Digital calls the ‘smartest generation’ and what his nemesis, Mark Bauerlein of Emery College calls “The Dumbest Generation” in his recent book by the same name.
Woody H

Digital divide - Wikipedia, the free encyclopedia - 0 views

  • The term digital divide refers to the gap between people with effective access to digital and information technology and those with very limited or no access at all. It includes the imbalances in physical access to technology as well as the imbalances in resources and skills needed to effectively participate as a digital citizen. In other words, it is the unequal access by some members of society to information and communication technology, and the unequal acquisition of related skills. The term is closely related to the knowledge divide as the lack of technology causes lack of useful information and knowledge. The digital divide may be classified based on gender, income, and race groups, and by locations.[1] The term global digital divide refers to differences in technology access between countries or the whole world.
  • Digital divide and education
  • Digital divide worldwide
  •  
    This is the Wikipedia page of the digital divide. This shows what the digital divide really is.
  •  
    gives alot of different facts about the digital divide
d l

Proper Posture and Spine Health for Computer Users | Health | Geniusbeauty.com - Blog f... - 0 views

  • It’s very important for your health to keep the right posture when you’re in front of a computer.
  • Incorrect posture contributes to spine syndrome and lots of other problems, which many PC users have.
  • adjust your chair properly.
  • ...9 more annotations...
  • backrest of the chair should support your lower back, but at the same time it shouldn’t be fastened firmly to let you move easily.
  • A headrest would help to release the tension in your neck muscles.
  • Hold your head erect with a slight slope forward.
  • When you are typing
  • When you are typing, make sure that your shoulders are relaxed and your elbows are bent at right angle.
  • Ideally a chair or an arm-chair should have a soft seat, your knees should be bent at right angle and your feet should be flat on the floor. If children use your computer, you should put a small stool under your table.
  • , place the monitor at a distance of your arm’s length.
  • , don’t let yourself sit in front of your pc for hours.
  • Find time to stand up from time to time and make some simple exercises: bending, squatting – stretch your muscles.
  •  
    This tells you what the proper posture while on the computer.
« First ‹ Previous 281 - 300 Next › Last »
Showing 20 items per page